mirror of
https://git.freebsd.org/ports.git
synced 2025-07-18 01:39:16 -04:00
Repeated words are are hard to to find sometimes.
Approved by: portmgr (itetcu)
This commit is contained in:
parent
a03386997b
commit
c5d811a37d
Notes:
svn2git
2021-03-31 03:12:20 +00:00
svn path=/head/; revision=288737
58 changed files with 58 additions and 58 deletions
|
@ -7,7 +7,7 @@ common words, and even some commands. The GOK will provide an
|
||||||
alternative interface to common commands and functions within
|
alternative interface to common commands and functions within
|
||||||
applications that utilize the AT SPI.
|
applications that utilize the AT SPI.
|
||||||
|
|
||||||
The GOK is is designed to be usable by many alternative input
|
The GOK is designed to be usable by many alternative input
|
||||||
methods, i.e. not a common keyboard and mouse combination.
|
methods, i.e. not a common keyboard and mouse combination.
|
||||||
|
|
||||||
WWW: http://www.gok.ca
|
WWW: http://www.gok.ca
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
Ghostess is a a graphical DSSI host, based on jack-dssi-host, but
|
Ghostess is a graphical DSSI host, based on jack-dssi-host, but
|
||||||
capable of saving and restoring plugin configuration, as well as
|
capable of saving and restoring plugin configuration, as well as
|
||||||
specifying MIDI channels and layering synths. ghostess includes
|
specifying MIDI channels and layering synths. ghostess includes
|
||||||
three MIDI drivers: an ALSA sequencer MIDI driver, a (clumsy but
|
three MIDI drivers: an ALSA sequencer MIDI driver, a (clumsy but
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
id3 enables to to retrieve and update information from ID3 tags in
|
id3 enables to retrieve and update information from ID3 tags in
|
||||||
MP3 files. It supports version 1.0, 1.1 and 2.2+ (only reading text- and
|
MP3 files. It supports version 1.0, 1.1 and 2.2+ (only reading text- and
|
||||||
url-frames at the moment).
|
url-frames at the moment).
|
||||||
|
|
||||||
|
|
|
@ -3,7 +3,7 @@ XML-based Standard Hex Format (SHF).
|
||||||
Shftool is also a working converter/generator/extractor
|
Shftool is also a working converter/generator/extractor
|
||||||
between/to/of SHF-files and other hex formats.
|
between/to/of SHF-files and other hex formats.
|
||||||
|
|
||||||
SHF is specified in the the following Internet Draft:
|
SHF is specified in the following Internet Draft:
|
||||||
http://ietf.org/internet-drafts/draft-strombergson-shf-06.txt
|
http://ietf.org/internet-drafts/draft-strombergson-shf-06.txt
|
||||||
|
|
||||||
WWW: http://www.df.lth.se/~triad/krad/shftool/
|
WWW: http://www.df.lth.se/~triad/krad/shftool/
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
This is the the client and protocol library for the Drizzle project.
|
This is the client and protocol library for the Drizzle project.
|
||||||
The server, drizzled, will use this as for protocol library. Client
|
The server, drizzled, will use this as for protocol library. Client
|
||||||
utilities and any new projects that require low-level protocol
|
utilities and any new projects that require low-level protocol
|
||||||
communication (like proxies). Other language interfaces (PHP
|
communication (like proxies). Other language interfaces (PHP
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
mywwwatcher is php application intended to handle the administration
|
mywwwatcher is php application intended to handle the administration
|
||||||
of MySQL over the web interface. It is small, quick, easy to use
|
of MySQL over the web interface. It is small, quick, easy to use
|
||||||
alternative to phpMyAdmin. In comparison with with phpMyAdmin
|
alternative to phpMyAdmin. In comparison with phpMyAdmin
|
||||||
is this application more oriented to hand writing of SQL queries
|
is this application more oriented to hand writing of SQL queries
|
||||||
and their use for later use.
|
and their use for later use.
|
||||||
It enables also other tasks like database dump, import, export (csv, html),
|
It enables also other tasks like database dump, import, export (csv, html),
|
||||||
|
|
|
@ -6,7 +6,7 @@ can be used to store all relevant information about these
|
||||||
non-relationships so they can later be introspected and examined.
|
non-relationships so they can later be introspected and examined.
|
||||||
|
|
||||||
This module is fairly esoteric and, unless you are dynamically
|
This module is fairly esoteric and, unless you are dynamically
|
||||||
creating something out of of a DBIC Schema, is probably the wrong
|
creating something out of a DBIC Schema, is probably the wrong
|
||||||
solution for whatever it is you are trying to do. Please be advised
|
solution for whatever it is you are trying to do. Please be advised
|
||||||
that compatibility is not guaranteed for DBIx::Class 0.09000+. We
|
that compatibility is not guaranteed for DBIx::Class 0.09000+. We
|
||||||
will try to mantain all compatibility, but internal changes might
|
will try to mantain all compatibility, but internal changes might
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
Module::Install is a a standalone, extensible installer for Perl modules.
|
Module::Install is a standalone, extensible installer for Perl modules.
|
||||||
It is designed to be a drop-in replacement for ExtUtils::MakeMaker, and is a
|
It is designed to be a drop-in replacement for ExtUtils::MakeMaker, and is a
|
||||||
descendent of CPAN::MakeMaker.
|
descendent of CPAN::MakeMaker.
|
||||||
Please type "perldoc Module::Install" after installation to see the
|
Please type "perldoc Module::Install" after installation to see the
|
||||||
|
|
|
@ -2,7 +2,7 @@ Object::Destroyer allows for the creation of "Destroy" handles. The
|
||||||
handle is "attached" to the circular relationship, but is not a part
|
handle is "attached" to the circular relationship, but is not a part
|
||||||
of it. When the destroy handle falls out of scope, it will be cleaned
|
of it. When the destroy handle falls out of scope, it will be cleaned
|
||||||
up correctly, and while being cleaned up, it will also force the data
|
up correctly, and while being cleaned up, it will also force the data
|
||||||
structure it is attached to to be destroyed as well. Object::Destroyer
|
structure it is attached to be destroyed as well. Object::Destroyer
|
||||||
can call a specified release method on an object (or method DESTROY by
|
can call a specified release method on an object (or method DESTROY by
|
||||||
default). Alternatively, it can execute an arbitrary user code passed
|
default). Alternatively, it can execute an arbitrary user code passed
|
||||||
to constructor as a code reference.
|
to constructor as a code reference.
|
||||||
|
|
|
@ -9,7 +9,7 @@ data exchange and storage.
|
||||||
The module is written in C and it is up to 250 times faster when compared to
|
The module is written in C and it is up to 250 times faster when compared to
|
||||||
the other python JSON implementations which are written directly in python.
|
the other python JSON implementations which are written directly in python.
|
||||||
This speed gain varies with the complexity of the data and the operation and
|
This speed gain varies with the complexity of the data and the operation and
|
||||||
is the the range of 10-200 times for encoding operations and in the range of
|
is the range of 10-200 times for encoding operations and in the range of
|
||||||
100-250 times for decoding operations.
|
100-250 times for decoding operations.
|
||||||
|
|
||||||
WWW: http://www.python.org/pypi/python-cjson/
|
WWW: http://www.python.org/pypi/python-cjson/
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
py-rioritized_methods is an extension to PEAK-Rules to prioritize
|
py-rioritized_methods is an extension to PEAK-Rules to prioritize
|
||||||
methods in order to to avoid AmbiguousMethods situations.This module
|
methods in order to avoid AmbiguousMethods situations.This module
|
||||||
provides four decorators:
|
provides four decorators:
|
||||||
prioritized_when
|
prioritized_when
|
||||||
prioritized_around
|
prioritized_around
|
||||||
|
|
|
@ -2,7 +2,7 @@ A Ruby gem to manage ISO 3166 country names and their
|
||||||
corresponding alpha-2 and alpha-3 codes. Additional
|
corresponding alpha-2 and alpha-3 codes. Additional
|
||||||
support has been added for ISO 4127 currency information
|
support has been added for ISO 4127 currency information
|
||||||
and standard conventions for states in the USA
|
and standard conventions for states in the USA
|
||||||
(based on the the 3166-2:US code).
|
(based on the 3166-2:US code).
|
||||||
|
|
||||||
ISO 3166 country codes reference:
|
ISO 3166 country codes reference:
|
||||||
http://en.wikipedia.org/wiki/ISO_3166-1
|
http://en.wikipedia.org/wiki/ISO_3166-1
|
||||||
|
|
|
@ -6,7 +6,7 @@ TIJmp is written to be fast and have a small footprint, both memory- and cpu-
|
||||||
wise. This means that the jvm will run at almost full speed, until you use
|
wise. This means that the jvm will run at almost full speed, until you use
|
||||||
tijmp to find some information.
|
tijmp to find some information.
|
||||||
|
|
||||||
TIJmp uses C code to talk to the jvm and it uses swing to show the the tables
|
TIJmp uses C code to talk to the jvm and it uses swing to show the tables
|
||||||
of information. So tijmp is written in C (using jvmti and jni) and Java.
|
of information. So tijmp is written in C (using jvmti and jni) and Java.
|
||||||
|
|
||||||
TIJmp runs in the same jvm as the program being profiled. This means that it
|
TIJmp runs in the same jvm as the program being profiled. This means that it
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
Kasablanca is a a graphical ftp client for KDE.
|
Kasablanca is a graphical ftp client for KDE.
|
||||||
|
|
||||||
Features:
|
Features:
|
||||||
o ftps encryption via AUTH TLS
|
o ftps encryption via AUTH TLS
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
excido is a free (GPL) game. It combines (simple|old school|arcadey) gameplay
|
excido is a free (GPL) game. It combines (simple|old school|arcadey) gameplay
|
||||||
with 3D OpenGL graphics graphics and OpenAL positional audio. Excido is not a
|
with 3D OpenGL graphics and OpenAL positional audio. Excido is not a
|
||||||
highly complex experience, but you may enjoy it as a small diversion.
|
highly complex experience, but you may enjoy it as a small diversion.
|
||||||
|
|
||||||
Excido was developed under GNU/Linux, and has also been found to work on MacOS
|
Excido was developed under GNU/Linux, and has also been found to work on MacOS
|
||||||
|
|
|
@ -10,7 +10,7 @@ on the bottom and scores :). The more rows disappear at a time, the more
|
||||||
scores you have. If you can't place the whole figure on the bottom, then it
|
scores you have. If you can't place the whole figure on the bottom, then it
|
||||||
stays on the wall and this wall became frozen (you can't place figures on
|
stays on the wall and this wall became frozen (you can't place figures on
|
||||||
it) for a while. After nth rows were successfully cleared, you will receive
|
it) for a while. After nth rows were successfully cleared, you will receive
|
||||||
bonus figure and go to to the next level - game speed will be increased.
|
bonus figure and go to the next level - game speed will be increased.
|
||||||
Your task is to play more longer and earn more scores.
|
Your task is to play more longer and earn more scores.
|
||||||
|
|
||||||
WWW: http://www.xnc.dubna.su/xwelltris/
|
WWW: http://www.xnc.dubna.su/xwelltris/
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
Backfract is an animated wallpaper program for Unix with X windows.
|
Backfract is an animated wallpaper program for Unix with X windows.
|
||||||
It fills your background window with a fractal image, then every
|
It fills your background window with a fractal image, then every
|
||||||
15 minutes it will update the image by zooming in or out. As it
|
15 minutes it will update the image by zooming in or out. As it
|
||||||
zooms in on it it uses a simple heuristic to try to stay with
|
zooms in, it uses a simple heuristic to try to stay with
|
||||||
"interesting" scenes.
|
"interesting" scenes.
|
||||||
|
|
||||||
WWW: http://www.inetarena.com/~wms/comp/backfract/
|
WWW: http://www.inetarena.com/~wms/comp/backfract/
|
||||||
|
|
|
@ -1,3 +1,3 @@
|
||||||
Bmp2html is a simple program that converts a bmpfile to to a html file.
|
Bmp2html is a simple program that converts a bmpfile to a html file.
|
||||||
|
|
||||||
EXAMPLES: http://critical.ch/bmp2html/
|
EXAMPLES: http://critical.ch/bmp2html/
|
||||||
|
|
|
@ -3,7 +3,7 @@ OpenGL API (JSR-231), and is designed to provide hardware-supported 3D graphics
|
||||||
to applications written in Java. JOGL provides full access to the APIs in the
|
to applications written in Java. JOGL provides full access to the APIs in the
|
||||||
OpenGL 1.3 - 3.0, >= 3.1, ES 1.x and ES 2.x specification as well as nearly all
|
OpenGL 1.3 - 3.0, >= 3.1, ES 1.x and ES 2.x specification as well as nearly all
|
||||||
vendor extensions. It integrates with the AWT and Swing widget sets, as well
|
vendor extensions. It integrates with the AWT and Swing widget sets, as well
|
||||||
with custom windowing toolkits using the the NativeWindow API. It is part of a
|
with custom windowing toolkits using the NativeWindow API. It is part of a
|
||||||
suite of open-source technologies initiated by the Game Technology Group at Sun
|
suite of open-source technologies initiated by the Game Technology Group at Sun
|
||||||
Microsystems.
|
Microsystems.
|
||||||
|
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
AC3D is a 3D object/scene modeller available for Linux, Windows 95/NT, and
|
AC3D is a 3D object/scene modeller available for Linux, Windows 95/NT, and
|
||||||
SGI. It is is very easy to use, yet powerful - anyone can create good looking
|
SGI. It is very easy to use, yet powerful - anyone can create good looking
|
||||||
3D objects in a few minutes. It outputs POV-Ray, VRML (1 and 2), RenderMan,
|
3D objects in a few minutes. It outputs POV-Ray, VRML (1 and 2), RenderMan,
|
||||||
Dive, Massive and other formats.
|
Dive, Massive and other formats.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
This uses the the Imager to find the average gray value
|
This uses the Imager to find the average gray value
|
||||||
for a image.
|
for a image.
|
||||||
|
|
||||||
WWW: http://search.cpan.org/dist/Imager-AverageGray/
|
WWW: http://search.cpan.org/dist/Imager-AverageGray/
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
This module provides an interface to to the vcg graphing tool. It supports a
|
This module provides an interface to the vcg graphing tool. It supports a
|
||||||
limited selection of options and file formats. The vcg graphing tool homepage
|
limited selection of options and file formats. The vcg graphing tool homepage
|
||||||
is currently http://rw4.cs.uni-sb.de/users/sander/html/gsvcg1.html but is
|
is currently http://rw4.cs.uni-sb.de/users/sander/html/gsvcg1.html but is
|
||||||
being actively developed elsewhere.
|
being actively developed elsewhere.
|
||||||
|
|
|
@ -2,6 +2,6 @@ With PEAR::Image_Barcode class you can create a barcode representation of a
|
||||||
given string.
|
given string.
|
||||||
|
|
||||||
This class uses GD function because this the generated graphic can be any of
|
This class uses GD function because this the generated graphic can be any of
|
||||||
GD supported supported image types.
|
GD supported image types.
|
||||||
|
|
||||||
WWW: http://pear.php.net/package/Image_Barcode/
|
WWW: http://pear.php.net/package/Image_Barcode/
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
This is the PHP extension of the Puzzle library, which is is designed to
|
This is the PHP extension of the Puzzle library, which is designed to
|
||||||
quickly find visually similar images (GIF, PNG, JPG), even if they have been
|
quickly find visually similar images (GIF, PNG, JPG), even if they have been
|
||||||
resized, recompressed, recolored or slightly modified.
|
resized, recompressed, recolored or slightly modified.
|
||||||
The library is free, lightweight yet very fast, configurable, easy to use
|
The library is free, lightweight yet very fast, configurable, easy to use
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
This is a Java port of GNU getopt, a class for parsing command line arguments
|
This is a Java port of GNU getopt, a class for parsing command line arguments
|
||||||
passed to programs. It it based on the C getopt() functions in glibc 2.0.6 and
|
passed to programs. It is based on the C getopt() functions in glibc 2.0.6 and
|
||||||
should parse options in a 100% compatible manner.
|
should parse options in a 100% compatible manner.
|
||||||
|
|
||||||
WWW: http://www.urbanophile.com/~arenn/hacking/download.html#getopt
|
WWW: http://www.urbanophile.com/~arenn/hacking/download.html#getopt
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
Optional extras for the CMU implementation of Common Lisp.
|
Optional extras for the CMU implementation of Common Lisp.
|
||||||
|
|
||||||
Optional packages for graphical user interfaces and other Common Lisp
|
Optional packages for graphical user interfaces and other Common Lisp
|
||||||
applications and libraries are are on:
|
applications and libraries are on:
|
||||||
|
|
||||||
ftp://cmucl.cons.org/pub/lisp/cmucl/
|
ftp://cmucl.cons.org/pub/lisp/cmucl/
|
||||||
|
|
||||||
|
|
|
@ -5,7 +5,7 @@ transforms it into a Buechi automaton, using a generalized Buechi
|
||||||
automaton as an intermediate step. Each automaton is simplified
|
automaton as an intermediate step. Each automaton is simplified
|
||||||
on-the-fly in order to save memory and time. As usual the LTL formula
|
on-the-fly in order to save memory and time. As usual the LTL formula
|
||||||
is simplified before any treatment. ltl2ba is more efficient than
|
is simplified before any treatment. ltl2ba is more efficient than
|
||||||
Spin 3.4.1, with regard to the the size of the resulting automaton,
|
Spin 3.4.1, with regard to the size of the resulting automaton,
|
||||||
the time of the computation, and the memory used.
|
the time of the computation, and the memory used.
|
||||||
|
|
||||||
WWW: http://www.lsv.ens-cachan.fr/~gastin/ltl2ba/
|
WWW: http://www.lsv.ens-cachan.fr/~gastin/ltl2ba/
|
||||||
|
|
|
@ -10,7 +10,7 @@ difficult task for a human, as small differences in numerical output values
|
||||||
are expected. File differencing utilites, such as diff(1), will generally
|
are expected. File differencing utilites, such as diff(1), will generally
|
||||||
produce voluminous output, often longer than the original files.
|
produce voluminous output, often longer than the original files.
|
||||||
|
|
||||||
ndiff solves this problem. Taking two two text files expected to be
|
ndiff solves this problem. Taking two text files expected to be
|
||||||
identical, or at least numerically similar, it allows to specify absolute
|
identical, or at least numerically similar, it allows to specify absolute
|
||||||
and/or relative error tolerances for differences between numerical values
|
and/or relative error tolerances for differences between numerical values
|
||||||
in the two files, and then reports only the lines with values exceeding
|
in the two files, and then reports only the lines with values exceeding
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
Statistics::R will permit the control of the the R (R-project) interpreter
|
Statistics::R will permit the control of the R (R-project) interpreter
|
||||||
through Perl in different architectures and OS.
|
through Perl in different architectures and OS.
|
||||||
|
|
||||||
WWW: http://search.cpan.org/dist/Statistics-R/
|
WWW: http://search.cpan.org/dist/Statistics-R/
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
PRNG is a collection of portable, high-performance ANSI-C implementations of
|
PRNG is a collection of portable, high-performance ANSI-C implementations of
|
||||||
pseudorandom number generators such as linear congruential, inversive
|
pseudorandom number generators such as linear congruential, inversive
|
||||||
congruential, and explicit inversive congruential random number generators (LCG,
|
congruential, and explicit inversive congruential random number generators (LCG,
|
||||||
ICG and EICG, respectively) created by Otmar Lendl and and Josef Leydold.
|
ICG and EICG, respectively) created by Otmar Lendl and Josef Leydold.
|
||||||
|
|
||||||
WWW: http://statistik.wu-wien.ac.at/software/prng/index.html
|
WWW: http://statistik.wu-wien.ac.at/software/prng/index.html
|
||||||
|
|
|
@ -1,2 +1,2 @@
|
||||||
Callid is a tool to be be able to show incoming calls in a web-based interface.
|
Callid is a tool to be able to show incoming calls in a web-based interface.
|
||||||
the calls are logged through the ISDN D-Channel.
|
the calls are logged through the ISDN D-Channel.
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
If you use Perl to manage interactive sessions with with the
|
If you use Perl to manage interactive sessions with the
|
||||||
command-line interfaces of networked appliances, then you might find
|
command-line interfaces of networked appliances, then you might find
|
||||||
this module useful.
|
this module useful.
|
||||||
|
|
||||||
|
|
|
@ -6,7 +6,7 @@ bytes. The first three bytes are the OUI.
|
||||||
This module allows you to take a MAC address and turn it into the OUI and
|
This module allows you to take a MAC address and turn it into the OUI and
|
||||||
vendor information. You can, for instance, scan a network, collect MAC
|
vendor information. You can, for instance, scan a network, collect MAC
|
||||||
addresses, and turn those addresses into vendors. With vendor information,
|
addresses, and turn those addresses into vendors. With vendor information,
|
||||||
you can often guess at what what you are looking at (e.g. an Apple
|
you can often guess at what you are looking at (e.g. an Apple
|
||||||
product).
|
product).
|
||||||
|
|
||||||
You can use this as a module as its individual functions, or call it as a
|
You can use this as a module as its individual functions, or call it as a
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
radsecproxy is a generic RADIUS proxy that in addition to to usual RADIUS
|
radsecproxy is a generic RADIUS proxy that in addition to usual RADIUS
|
||||||
UDP transport, also supports TLS (RadSec), as well as RADIUS over TCP and
|
UDP transport, also supports TLS (RadSec), as well as RADIUS over TCP and
|
||||||
DTLS. The aim is for the proxy to have sufficient features to be flexible,
|
DTLS. The aim is for the proxy to have sufficient features to be flexible,
|
||||||
while at the same time to be small, efficient and easy to configure.
|
while at the same time to be small, efficient and easy to configure.
|
||||||
|
|
|
@ -3,7 +3,7 @@ monitors traffic on any number of Ethernet interfaces and examines ARP replies
|
||||||
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
|
and gratuitous ARP requests. If it notices an ARP reply or gratuitous ARP
|
||||||
request that is in conflict with its notion of "correct" Ethernet/IP address
|
request that is in conflict with its notion of "correct" Ethernet/IP address
|
||||||
pairs, it logs the attack if logging is enabled, and, if the Ethernet
|
pairs, it logs the attack if logging is enabled, and, if the Ethernet
|
||||||
interface that the attack was seen on is is configured as being in aggressive
|
interface that the attack was seen on is configured as being in aggressive
|
||||||
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
|
mode, it sends out a gratuitous ARP request and a gratuitous ARP reply with
|
||||||
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
|
the "correct" Ethernet/IP address pair in an attempt to reset the ARP tables
|
||||||
of hosts on the local network segment. The corrective gratuitous ARP request
|
of hosts on the local network segment. The corrective gratuitous ARP request
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
The BlindElephant Web Application Fingerprinter attempts to discover
|
The BlindElephant Web Application Fingerprinter attempts to discover
|
||||||
the version of a (known) web application by comparing static files
|
the version of a (known) web application by comparing static files
|
||||||
at known locations against precomputed hashes for versions of those
|
at known locations against precomputed hashes for versions of those
|
||||||
files in all all available releases. The technique is fast,
|
files in all available releases. The technique is fast,
|
||||||
low-bandwidth, non-invasive, generic, and highly automatable.
|
low-bandwidth, non-invasive, generic, and highly automatable.
|
||||||
|
|
||||||
WWW: http://blindelephant.sourceforge.net/
|
WWW: http://blindelephant.sourceforge.net/
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
GSS is an implementation of the Generic Security Service Application Program
|
GSS is an implementation of the Generic Security Service Application Program
|
||||||
Interface (GSS-API). GSS-API is used by network servers (e.g., IMAP, SMTP) to
|
Interface (GSS-API). GSS-API is used by network servers (e.g., IMAP, SMTP) to
|
||||||
provide security security services, e.g., authenticate clients against servers.
|
provide security services, e.g., authenticate clients against servers.
|
||||||
GSS consists of a library and a manual.
|
GSS consists of a library and a manual.
|
||||||
|
|
||||||
WWW: http://www.gnu.org/software/gss/
|
WWW: http://www.gnu.org/software/gss/
|
||||||
|
|
|
@ -5,7 +5,7 @@ Cryptography.
|
||||||
Two interfaces are provided in the module. The first is
|
Two interfaces are provided in the module. The first is
|
||||||
straight block encryption/decryption the second does base64
|
straight block encryption/decryption the second does base64
|
||||||
mime encoding/decoding of the encrypted/decrypted blocks.
|
mime encoding/decoding of the encrypted/decrypted blocks.
|
||||||
The idea is the the two sides have a shared secret that
|
The idea is the two sides have a shared secret that
|
||||||
supplies one of the keys and a randomly generated block of
|
supplies one of the keys and a randomly generated block of
|
||||||
bytes provides the second key. The random key is passed in
|
bytes provides the second key. The random key is passed in
|
||||||
cleartext between the two sides.
|
cleartext between the two sides.
|
||||||
|
|
|
@ -7,7 +7,7 @@
|
||||||
straight block encryption/decryption the second does base64
|
straight block encryption/decryption the second does base64
|
||||||
mime encoding/decoding of the encrypted/decrypted blocks.
|
mime encoding/decoding of the encrypted/decrypted blocks.
|
||||||
|
|
||||||
The idea is the the two sides have a shared secret that
|
The idea is that the two sides have a shared secret that
|
||||||
supplies one of the keys and a randomly generated block of
|
supplies one of the keys and a randomly generated block of
|
||||||
bytes provides the second key. The random key is passed in
|
bytes provides the second key. The random key is passed in
|
||||||
cleartext between the two sides.
|
cleartext between the two sides.
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
Text::Password::Pronounceable - Generate pronounceable passwords
|
Text::Password::Pronounceable - Generate pronounceable passwords
|
||||||
|
|
||||||
This module generates pronuceable passwords, based the the
|
This module generates pronuceable passwords, based the
|
||||||
English digraphs by D Edwards.
|
English digraphs by D Edwards.
|
||||||
|
|
||||||
WWW: http://search.cpan.org/dist/Text-Password-Pronounceable/
|
WWW: http://search.cpan.org/dist/Text-Password-Pronounceable/
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
PAM module which permits authentication for arbitrary services via
|
PAM module which permits authentication for arbitrary services via
|
||||||
ssh-agent. Written with sudo in mind, but like any auth PAM module,
|
ssh-agent. Written with sudo in mind, but like any auth PAM module,
|
||||||
can be used for for many purposes.
|
can be used for many purposes.
|
||||||
|
|
||||||
WWW: http://pamsshagentauth.sourceforge.net/
|
WWW: http://pamsshagentauth.sourceforge.net/
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
Replacement for htpasswd.
|
Replacement for htpasswd.
|
||||||
|
|
||||||
This port will install htpasswd.py that can be found in trac trac contrib
|
This port will install htpasswd.py that can be found in trac contrib
|
||||||
directory.
|
directory.
|
||||||
|
|
||||||
WWW: http://trac.edgewall.org/browser/trunk/contrib/htpasswd.py
|
WWW: http://trac.edgewall.org/browser/trunk/contrib/htpasswd.py
|
||||||
|
|
|
@ -6,7 +6,7 @@ the industry, but will bring new ideas and technologies to the field.
|
||||||
|
|
||||||
OISF is part of and funded by the Department of Homeland Security's Directorate
|
OISF is part of and funded by the Department of Homeland Security's Directorate
|
||||||
for Science and Technology HOST program (Homeland Open Security Technology),
|
for Science and Technology HOST program (Homeland Open Security Technology),
|
||||||
by the the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
|
by the Navy's Space and Naval Warfare Systems Command (SPAWAR), as well as
|
||||||
through the very generous support of the members of the OISF Consortium.
|
through the very generous support of the members of the OISF Consortium.
|
||||||
|
|
||||||
More information about the Consortium is available, as well as a list of our
|
More information about the Consortium is available, as well as a list of our
|
||||||
|
|
|
@ -15,7 +15,7 @@ This package contains the following programs:
|
||||||
- mkhybrid (an ISO-9660/HFS filesystem image creator)
|
- mkhybrid (an ISO-9660/HFS filesystem image creator)
|
||||||
Link to mkisofs.
|
Link to mkisofs.
|
||||||
- readcd (a data CD reading and recording program)
|
- readcd (a data CD reading and recording program)
|
||||||
May be used to to write to DVD-RAM and to copy Solaris boot CD's.
|
May be used to write to DVD-RAM and to copy Solaris boot CD's.
|
||||||
- scgcheck (checks and validates the ABI of libscg)
|
- scgcheck (checks and validates the ABI of libscg)
|
||||||
- rscsi (daemon providing access to local SCSI-devices over the network)
|
- rscsi (daemon providing access to local SCSI-devices over the network)
|
||||||
|
|
||||||
|
|
|
@ -15,7 +15,7 @@ This package contains the following programs:
|
||||||
- mkhybrid (an ISO-9660/HFS filesystem image creator)
|
- mkhybrid (an ISO-9660/HFS filesystem image creator)
|
||||||
Link to mkisofs.
|
Link to mkisofs.
|
||||||
- readcd (a data CD reading and recording program)
|
- readcd (a data CD reading and recording program)
|
||||||
May be used to to write to DVD-RAM and to copy Solaris boot CD's.
|
May be used to write to DVD-RAM and to copy Solaris boot CD's.
|
||||||
- scgcheck (checks and validates the ABI of libscg)
|
- scgcheck (checks and validates the ABI of libscg)
|
||||||
- rscsi (daemon providing access to local SCSI-devices over the network)
|
- rscsi (daemon providing access to local SCSI-devices over the network)
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
This is a network-based backup system based of of rync. It can do full and
|
This is a network-based backup system based of rync. It can do full and
|
||||||
incremental backups to a remote file server. It relies on rsync for the
|
incremental backups to a remote file server. It relies on rsync for the
|
||||||
host to host copy and uses hard links to provide multiple snapshots of the
|
host to host copy and uses hard links to provide multiple snapshots of the
|
||||||
data without duplicating identical files.
|
data without duplicating identical files.
|
||||||
|
|
|
@ -4,7 +4,7 @@ written in Keyman keyboard language and developed as a part of Varamozhi
|
||||||
Project under the LGPL license.
|
Project under the LGPL license.
|
||||||
|
|
||||||
The Mozhi is intended to be the most intuitive scheme for Malayalam speakers.
|
The Mozhi is intended to be the most intuitive scheme for Malayalam speakers.
|
||||||
It simplifies what the user needs to remember and is is not phonetically
|
It simplifies what the user needs to remember and is not phonetically
|
||||||
accurate.
|
accurate.
|
||||||
|
|
||||||
This keymap supports the current standard for Malayalam Chillus (i.e. without
|
This keymap supports the current standard for Malayalam Chillus (i.e. without
|
||||||
|
|
|
@ -1,5 +1,5 @@
|
||||||
makefaq is a Python program that creates a Frequently Asked Questions (FAQ)
|
makefaq is a Python program that creates a Frequently Asked Questions (FAQ)
|
||||||
list from a specially formatted text data file. For output, it can can
|
list from a specially formatted text data file. For output, it can
|
||||||
generate either an HTML page, a text file, or a DocBook XML file.
|
generate either an HTML page, a text file, or a DocBook XML file.
|
||||||
|
|
||||||
WWW: http://www.lodestar2.com/software/makefaq/
|
WWW: http://www.lodestar2.com/software/makefaq/
|
||||||
|
|
|
@ -17,7 +17,7 @@ is not up against a numeric substring in another, the non-numeric always comes
|
||||||
first. This is fudged by reading pretending that the lack of a number substring
|
first. This is fudged by reading pretending that the lack of a number substring
|
||||||
has the value -1, like so:
|
has the value -1, like so:
|
||||||
* The start of a string is exceptional: leading non-\W (non-word,
|
* The start of a string is exceptional: leading non-\W (non-word,
|
||||||
non-digit) components are are ignored, and numbers come before letters.
|
non-digit) components are ignored, and numbers come before letters.
|
||||||
* I define "numeric substring" just as sequences matching m/\d+/ --
|
* I define "numeric substring" just as sequences matching m/\d+/ --
|
||||||
scientific notation, commas, decimals, etc., are not seen. If your data has
|
scientific notation, commas, decimals, etc., are not seen. If your data has
|
||||||
thousands separators in numbers ("20,000 Leagues Under The Sea" or "20.000
|
thousands separators in numbers ("20,000 Leagues Under The Sea" or "20.000
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
Read data from Excel spread sheets without Microsoft! Provides an API to allow
|
Read data from Excel spread sheets without Microsoft! Provides an API to allow
|
||||||
any application to read Excel documents. The xlreader tool converts Excel data
|
any application to read Excel documents. The xlreader tool converts Excel data
|
||||||
to tab delimited, CSV or SQL inserts. Written in C. Based on the the Java
|
to tab delimited, CSV or SQL inserts. Written in C. Based on the Java
|
||||||
version by Andrew Khan.
|
version by Andrew Khan.
|
||||||
|
|
||||||
This project was designed out of frustration.
|
This project was designed out of frustration.
|
||||||
|
|
|
@ -4,7 +4,7 @@ From the XP homepage:
|
||||||
detects all non well-formed documents.
|
detects all non well-formed documents.
|
||||||
|
|
||||||
XP has the following design goals: Conformance and correctness, high
|
XP has the following design goals: Conformance and correctness, high
|
||||||
performance and a layered structure. Is is currently non-validating but can
|
performance and a layered structure. It is currently non-validating but can
|
||||||
parse all external entities.
|
parse all external entities.
|
||||||
|
|
||||||
For more details, please see the XP homepage:
|
For more details, please see the XP homepage:
|
||||||
|
|
|
@ -3,7 +3,7 @@ variables to your CGI::Application modules. Lazy loading is used to
|
||||||
prevent the config file from being parsed if no configuration variables
|
prevent the config file from being parsed if no configuration variables
|
||||||
are accessed during the request.
|
are accessed during the request.
|
||||||
|
|
||||||
The format is detected automatically using Config::Auto. It it known to
|
The format is detected automatically using Config::Auto. It is known to
|
||||||
support the following formats: colon separated, space separated, equals
|
support the following formats: colon separated, space separated, equals
|
||||||
separated, XML, Perl code, and Windows INI. See that modules
|
separated, XML, Perl code, and Windows INI. See that modules
|
||||||
documentation for complete details.
|
documentation for complete details.
|
||||||
|
|
|
@ -17,7 +17,7 @@ Registered developers have free access to the Alexa Web Information
|
||||||
Service during its beta period, but it is limited to 10,000 requests
|
Service during its beta period, but it is limited to 10,000 requests
|
||||||
per subscription ID per day.
|
per subscription ID per day.
|
||||||
|
|
||||||
There are some limitations, so be sure to read the The Amazon Alexa
|
There are some limitations, so be sure to read The Amazon Alexa
|
||||||
Web Information Service FAQ.
|
Web Information Service FAQ.
|
||||||
|
|
||||||
WWW: http://search.cpan.org/dist/Net-Amazon-AWIS/
|
WWW: http://search.cpan.org/dist/Net-Amazon-AWIS/
|
||||||
|
|
|
@ -3,6 +3,6 @@ of the W3 CSS Validator application (http://jigsaw.w3.org/css-validator/).
|
||||||
|
|
||||||
With this package you can connect to a running instance of the validator and
|
With this package you can connect to a running instance of the validator and
|
||||||
retrieve the validation results (true|false) as well as the errors and warnings
|
retrieve the validation results (true|false) as well as the errors and warnings
|
||||||
for a a style sheet.
|
for a style sheet.
|
||||||
|
|
||||||
WWW: http://pear.php.net/package/Services_W3C_CSSValidator/
|
WWW: http://pear.php.net/package/Services_W3C_CSSValidator/
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
Unicorn is an HTTP server for Rack applications designed to only serve fast
|
Unicorn is an HTTP server for Rack applications designed to only serve fast
|
||||||
clients on low-latency, high-bandwidth connections and take advantage of
|
clients on low-latency, high-bandwidth connections and take advantage of
|
||||||
features in Unix/Unix-like kernels. Slow clients should only be served by
|
features in Unix/Unix-like kernels. Slow clients should only be served by
|
||||||
placing a reverse proxy capable of fully buffering both the the request and
|
placing a reverse proxy capable of fully buffering both the request and
|
||||||
response in between Unicorn and slow clients.
|
response in between Unicorn and slow clients.
|
||||||
|
|
||||||
WWW: http://unicorn.bogomips.org/
|
WWW: http://unicorn.bogomips.org/
|
||||||
|
|
|
@ -9,6 +9,6 @@ Features
|
||||||
|
|
||||||
* PHP Output with built in authentication hooks
|
* PHP Output with built in authentication hooks
|
||||||
* Fast Processing
|
* Fast Processing
|
||||||
* Reporting right down the the location vistied
|
* Reporting right down the location vistied
|
||||||
|
|
||||||
WWW: http://www.crc.net.nz/software/srg.php
|
WWW: http://www.crc.net.nz/software/srg.php
|
||||||
|
|
|
@ -1,7 +1,7 @@
|
||||||
webtrees is the web's leading online collaborative genealogy
|
webtrees is the web's leading online collaborative genealogy
|
||||||
application. webtrees works from standard GEDCOM files, and is
|
application. webtrees works from standard GEDCOM files, and is
|
||||||
therefore compatible with every major desktop application. webtrees
|
therefore compatible with every major desktop application. webtrees
|
||||||
aims to to be efficient and effective by using the right combination
|
aims to be efficient and effective by using the right combination
|
||||||
of third-party tools, design techniques and open standards.
|
of third-party tools, design techniques and open standards.
|
||||||
|
|
||||||
WWW: http://webtrees.net/
|
WWW: http://webtrees.net/
|
||||||
|
|
|
@ -1,4 +1,4 @@
|
||||||
Xephyr is a a kdrive server that outputs to a window on a pre-existing
|
Xephyr is a kdrive server that outputs to a window on a pre-existing
|
||||||
'host' X display. Think Xnest but with support for modern extensions
|
'host' X display. Think Xnest but with support for modern extensions
|
||||||
like composite, damage and randr.
|
like composite, damage and randr.
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue